WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

Similar documents
The Embassy Closings

Following the Money to Combat Terrorism, Crime and Corruption

Crisis Watch: An Assessment of Al Qaeda and Recommendations for the United Kingdom s Overseas Counter Terrorism Strategy

Good afternoon. I want to thank Dr. Robert Satloff for his invitation to speak to you today.

Combating Terrorism Center at West Point. Success, Lethality, and Cell Structure Across the Dimensions of Al Qaeda

Foreign Policy Discussion Guide

LECTURE: TERRORISM DEFINING TERRORISM

Ensuring al-qa ida s Demise

The promotion of terror through otherness?

H. RES. ll. Expressing the sense of the House of Representatives with respect to United States policy towards Yemen, and for other purposes.

U.S. DEPARTMENT OF STATE Bureau of Diplomatic Security. Top Private-Sector Security Concerns in 2008

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Counter Terrorism Committee (CTC)

2014 GLOBAL TERRORISM INDEX

Fordham Urban Law Journal

Al Qaeda and U.S. Homeland Security after Bin Laden Rick Ozzie NELSON

Worldwide Caution: Annotated

UNITED NATIONS HEADQUARTERS, NEW YORK WEDNESDAY, 5 APRIL 2017, A.M. Ali Rached INTERPOL Counter-Terrorism Directorate

What the Trump Administration Needs to Know: Lessons Learned from Fifteen Years of Counterterrorism Campaigns

Stuxnet, 2010 Target: Iranian Reactor, Natanz

August 2013 Security Threat to Americans Abroad

LECTURE. The Changing Nature of Terror: Law and Policies to Protect America. Key Points. The Honorable Kenneth L. Wainstein

REGIONAL PROGRAMME TO COMBAT CRIMINAL & TERRORIST THREATS AND STRENGTHEN CRIMINAL JUSTICE & HEALTH SYSTEMS IN LINE WITH INTERNATIONAL STANDARDS ON

Confronting the Terror Finance Challenge in Today s Middle East

1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014

Secretary of State Mike Pompeo Remarks to Congress on Yemen November 28, 2018

Continuing Conflict in SW Asia. EQ: What are the causes and effects of key conflicts in SW Asia that required U.S. involvement?

THE ISLAMIC STATE AND ITS HUMAN TRAFFICKING PRACTICE

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

ANNEX 5. Public. Chronology of relevant events

The Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens

Terrorism in South Asia; Challenges for the West. Junaid Qureshi

Agenda: Protecting and Promoting Human Rights to Prevent and Counter Violent Extremism

A New Authorization for Use of Military Force Against the Islamic State: Comparison of Proposals in Brief

Criminological Theories

Introduction. Definition of Key Terms. Special Conference. Measures to suppress the financing of terrorism

Cover Story. - by Shraddha Bhandari. 24 JANUARY-FEBRUARY 2016 FSAI Journal

Weekly Geopolitical Report

Understanding the Transnational Criminal Organization

PC.DEL/764/08 15 September ENGLISH only

National Strategy. for. of the United States of America

World Youth Summit 2018 A Letter from Your Chair and Co-Chairs. Dear Delegates,

IRAQ: THE CURRENT SITUATION AND THE WAY AHEAD STATEMENT BY AMBASSADOR ZALMAY KHALILZAD SENATE FOREIGN RELATIONS COMMITTEE JULY 13, 2006

PUBLIC REPORT 2013 /// 2014

NATIONAL STRATEGY FOR COUNTERTERRORISM

Analyzing Terrorist Networks - Theories & Techniques

Weekly Geopolitical Report

VICTORIA POLICE COUNTER TERRORISM STRATEGY

Dirty Entanglements: Corruption, Crime and Terrorism Louise Shelley

Security Council. Topic B: Protection of Natural Resources and Cultural Heritage from Terrorism and Transnational Organized Crime

Drug trafficking and the case study in narco-terrorism. "If you quit drugs, you join the fight against terrorism." President George W.

U.S.- Gulf Cooperation Council Camp David Joint Statement

Montessori Model United Nations. Distr.: Middle School Twelfth Session XX March Security Council

Review for U.S. History test tomorrow

Implementing measures to control the spread of global terrorism networks

WINTER. March 24. Template

Foreign Fighter Interdiction: Stability Operations as Countermeasures

Terrorism in Africa: Challenges and perspectives

Addis Ababa, Ethiopia, P.O. Box: 3243 Tel.: (251-11) Fax: (251-11)

Executive Order: Border Security and Immigration Enforcement Improvements

S/PV Security Council Seventy-second year. 7877th meeting Tuesday, 7 February 2017, 10 a.m. New York. United Nations. Agenda (E)

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

ACP-EU JOINT PARLIAMENTARY ASSEMBLY

CSF Vienna Working Groups Recommendations

U.S. Attitudes toward Terrorism and Counterterrorism Gary LaFree, Stanley Presser, Roger Tourangeau, Amy Adamczyk

The War Against Terrorism

Information derived from several sources and searchable databases. All research conducted according to the project manual.

WikiLeaks Project* The Taliban s Assets in the United Arab Emirates

Global Trends in Terrorism

Noise in the Gray Zone:

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

Combating Transnational Organized Crime

Q2. (IF RIGHT DIRECTION) Why do you say that? (Up to two answers accepted.)

Modern Terrorism and Counter-Terrorism Strategies

PEW RESEARCH CENTER FOR THE PEOPLE AND THE PRESS & THE INTERNATIONAL HERALD TRIBUNE GLOBAL OPINION LEADER SURVEY FINAL TOPLINE NOV DEC.

Case 1:16-cr RMB Document 176 Filed 12/22/17 Page 1 of 10

States & Types of States

ROSMUN 2017 Rosary Sisters High School Model United Nations

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

Concerns About a Terrorist Attack in the U.S. Rise November 19-22, 2015

epp european people s party

religious movement that effectively ruled Afghanistan from the mid-1990s until the United States1 military intervention in

Committee Name Legal Political

U.S. TREASURY DEPARTMENT OFFICE OF PUBLIC AFFAIRS

ICAO AVIATION SECURITY GLOBAL RISK CONTEXT STATEMENT. (Extract)

UN Presentation- Combating the Evolving Threat from Foreign Terrorist Fighters

The Key Groups: The Irish Republican Army (IRA) The Palestinian Liberation Organisation (PLO) Al-Qaeda

CRS Report for Congress Received through the CRS Web

Terrorist Threat to Canada

UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

International Legal Framework on Counter-Terrorism As applicable to Pakistan

Severing the Web of Terrorist Financing

The Terror OCTOBER 18, 2001

HSPI Commentary Series

REPUBLICAN NATIONAL COMMITTEE RESEARCH BRIEFING BOOK AUGUST 7, 2015

How Money Laundering and Corruption Impact the World Economy. Dennis M. Lormel 10/06/2013

KPC 4 TH ERM CONFERENCE 27-29/03/2017

La politica di contrasto alla criminalità organizzata nell Unione Europea. 19 Dicembre 2015

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

Transcription:

The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC

Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2

Terrorist Threats 2014 Introduction Current Threat Environment in the U.S. Current Terrorist Flashpoints The Power of Financial Intelligence Conclusion 3

Introduction

Dangerous Trifecta Corruption Transnational Crime Terrorism 5

Crime Terror Nexus Includes two independent, but related, components Involvement in criminal activities by terrorists as funding source Linkage between criminal organizations and terrorist groups Evolution of convergence of transnational criminal organizations and terrorism emerged at end of cold war Created conditions that challenged the financial system of terrorism Evaporation of funding sources encourages terrorist groups to develop into Narco-Terrorist organizations Increasingly engage in drug trafficking and other illicit organized crime to acquire money and material 6

Hybrid Criminal / Terror Entities Transnational criminal organizations and terrorist groups share many operational and organizational similarities and characteristics Often learn from one another Imitate each other s successes and failures Frequently partner with one another Evolution of hybrid criminal / terror entities Nexus between transnational criminal organizations and terrorism increasingly complex and sophisticated Public and private sectors must develop new methodologies and strategies to deal with the problem of convergence Understanding the crime / terror nexus is first step toward solving the problem 7

Terrorist Financing Funding is the lifeblood of terrorist organizations Require financial support to succeed Must have effective financial infrastructures and support mechanisms There will be more successful terrorist attacks in the U.S. The best chance to prevent terrorists from succeeding is to disrupt their ability to raise, move and access money Need for proactive and reactive strategies 8

Most Significant Threats to the U.S. Violent home grown extremists Al-Qaeda in the Arabian Peninsula Syria This does not diminish the threats from Al-Qaeda and other terrorist groups 10

Current Terrorist Threat in U.S. On March 27, 2014, FBI Director James Comey testified before the Senate Appropriations Committee. His points on terrorism included: The threat from homegrown violent extremists is of particular concern. These individuals present unique challenges because they do not share a typical profile; their experience and motives are often distinct and personal. They are also increasingly savvy and willing to act alone, which makes them more difficult to identify and stop. The foreign terrorist threat is similarly complex and ever changing. Overseas we are seeing more groups and individuals engaged in terrorism, a wider array of terrorist targets, greater cooperation among terrorist groups, and continued evolution and adaptation in tactics and communication especially Al-Qaeda in the Arabian Peninsula 11

Yemen AQAP Threat On 8/25/2010, CIA reportedly considered for the first time since 9/11 that an al-qaeda offshoot group was a greater threat to the U.S. than al-qaeda Al-Qaeda in the Arabian Peninsula (AQAP) Al-Qaeda affiliate in Yemen Responsible for attempted UPS parcel bombings and Christmas day bombing attempt on flight to Detroit Ibrahim Hassan al-asiri bomb maker and group leader Responsible for threat that caused 19 U.S. consulates in Middle East to close during August 2013 Communication between AQAP leader Nasir al-wuhayshi and al- Qaeda leader Ayman al-zawahiri Publish Inspire magazine Successful recruitment tool used by Anwar al-awlaki and his recruitment successors 12

Nasir al-wuhayshi Leader of Al-Qaeda in the Arabian Peninsula (AQAP) Became leader in 2002 Brazenly appeared at meeting with over 100 AQAP operatives that was reported in the media on April 15, 2014 Video from meeting quoted al-wuhayshi stating we must eliminate the cross the bearier of the cross is America In retaliation, U.S. and Yemen made two drone attacks against AQAP killing numerous members possibly including al-asiri Has been elevated to Al-Qaedas second in command behind Ayman al-zawahiri Not a career enhancing position Prior three #2 Al-Qaeda leaders killed in drone missile attacks Served as a private secretary to Osama bin Laden 13

Violent Homegrown Extremists The Boston Marathon bombing in April 2013 reminds us that the terrorist threat (by violent homegrown extremists) against the U.S. remains persistent In the past two years, homegrown extremists have attempted to detonate improvised explosives devices or bombs at such high profile targets as the Federal Reserve bank in New York, commercial establishments in downtown Chicago, the Pentagon, and the U.S. Capitol Fortunately these attempts and many others were thwarted Yet the threat from such individuals remains Source: FBI Director Comey March 27, 2014 14

Syria Syria has become the pre-eminent location for Al-Qaeda aligned groups to recruit, to train and to equip what is now a growing number of extremists, some of whom seek to conduct external attacks From a terrorist perspective, the most disturbing element is that Al-Qaeda has declared Syria its most critical front Foreign fighters attracted to the Syrian battleground represent a long term threat to U.S. national security interests Syria has become an incubator for extremism 15

Jihadist Movement Jihadist movement divided into three basic elements Al-Qaeda core organization Regional jihadist franchises Grassroots operatives Two distinct types of operatives Professionals Amateurs Al-Qaeda and regional groups For the most part, highly trained professional terrorists Grassroots operatives Amateurs Continuum ranging from untrained lone wolves to one who received varying levels of training Never joined Al-Qaeda or other formal militant groups 16

Current Terrorist Flashpoints

Yemen Terror threat AQAP Significant threat to U.S. Extreme corruption 167 / 177 Funding sources Criminal activity Donations 18

Syria Terror threat Al-Qaeda in Syria Al-Qaeda in Iraq Foreign fighters (westerners) Extreme corruption (168 / 177) Funding sources Kuwait Other donors Kidnaping and other criminal activity 19

Iraq Terror threat Taliban Al-Qaeda in Iraq Extreme corruption (171 / 177) Funding sources Kidnaping and other criminal activity Donations 20

Afghanistan Terror threat Taliban Al-Qaeda Criminal organizations Growing alienation between Afghanis and Americans Tied for being most corrupt country Funding sources Drugs (heroin), kidnaping and other criminal activity 21

Pakistan Terror threat Al-Qaeda Taliban Other terrorist groups Criminal organizations Serious corruption (127 / 177) Funding sources Drugs, kidnaping, smuggling and other criminal activity Inter-Services Intelligence (ISI) Other donors to include criminals 22

Africa Terror threat Al-Qaeda in the Islamic Maghreb Al-Qaeda Al-Shabaab Boko Haram Criminal organizations Pervasive corruption in Africa Funding sources Drugs, kidnaping, extortion, wildlife smuggling and other criminal activity 23

Lebanon Terrorist threat Hizballah Criminal organizations Serious corruption (127 / 177) Funding sources Extensive global criminal infrastructure to support vast criminal activity Iran Criminal organizations 24

Israel to Include Palestinian Territory Terrorist threat Hamas Renewed relationship between Hamas and Palestinian Authority Emerging Al-Qaeda presence Little corruption in Israel (36 / 177) Extensive corruption in Palestinian territory Funding sources Extortion and smuggling Donations 25

The Power of Financial Intelligence

Importance of Financial Information As criminals and our financial system continue to become more sophisticated, financial transactional information becomes more relevant as a critically important investigative mechanism Finance, communications and greed are biggest vulnerabilities to bad guys An investigator s ability to collect and use financial information can be devastating to terrorists and criminals Without money, terrorist and criminal organizations cannot adequately function Financial investigations should be integral part of investigative strategies Knowing what financial information is relevant, where to collect it from, and how to use it are facts all investigators can benefit from 27

Financial Institutions Responding to Terrorist Incidents Terrorist incidents 9/11 Fort Hood shooting (Nidal Hasan) Time Square bombing attempt (Faisal Shahzad) New York subway bombing plot (Najibullah Zazi) Khalid Ali M. Aldawsari Mumbai Bombing Richard Headley Osama bin Laden s death Boston Marathon bombing Other incidents Following every incident financial institutions immediately came forward to assist law enforcement Provided law enforcement with valuable financial evidence 28

Identifying Terrorist Financing There are numerous alerting mechanisms that financial institutions can use to identify terrorist financing Proactive and reactive Challenging Targeted transaction monitoring Media reports Law enforcement Requests Process Transaction monitoring Front line employees Hotline Other mechanisms 29

Local to Global Funding Catalysts World events Change Opportunity Corridors Flows Threats 30

Triggers for Financial Trends Evolving sources of funds Legitimate to illegitimate (growing reliance on criminal activity) Terrorist and criminal organizations must have continuous access to funds Global money laundering requires the use of facilitation tools Facilitation tools used by terrorist and criminal organizations are dependent on world events and governance Local to regional to global Trends regarding financial mechanisms used by terrorist and criminal organizations are driven by opportunity 31

Contrasts of Using Financial System In using the financial system, terrorists are confronted with distinct contrasts Facilitation tool v. detection mechanism Serves as facilitation tool by providing continuous access to funds Financing the lifeblood of terrorist organizations Serves as detection mechanism because funds can be identified through monitoring and / or investigation Financing a major vulnerability 32

Conclusion

Looking Beyond 2014 Need to develop mechanisms to identify and address the convergence and diversification of terrorist and criminal groups Development of innovative and proactive initiatives Monitoring and investigative methodologies Vigilantly react to terrorist activity to identify potential funding mechanisms Training Need to assess emerging threats, financial requirements and terrorist flashpoints going forward 34

Conclusion Growing nexus between criminal organizations and terrorist groups More complex and sophisticated Convergence Diversification Unholy trifecta Corruption Transnational crime Terrorism Must develop new methodologies and strategies to deal with problem of convergence and diversification Proactive and reactive Understanding the crime terror nexus is first step toward solving the problem Exploit vulnerabilities of bad guys Finance Communications Greed 35

Dennis M. Lormel President & CEO DML Associates, LLC 19309 Winmeade Drive Lansdowne, VA 20176 571-333-0300 dlormel@dmlassociatesllc.com www.dmlassociatesllc.com 36